/hardware/intel/common/libwsbm/src/ |
D | wsbm_manager.c | 74 struct _WsbmBufStorage *storage; member 360 struct _WsbmBufStorage *storage; in wsbmBOWaitIdle() local 362 storage = buf->storage; in wsbmBOWaitIdle() 363 if (!storage) in wsbmBOWaitIdle() 366 (void)storage->pool->waitIdle(storage, lazy); in wsbmBOWaitIdle() 372 struct _WsbmBufStorage *storage = buf->storage; in wsbmBOMap() local 376 retval = storage->pool->map(storage, mode, &virtual); in wsbmBOMap() 384 struct _WsbmBufStorage *storage = buf->storage; in wsbmBOUnmap() local 386 if (!storage) in wsbmBOUnmap() 389 storage->pool->unmap(storage); in wsbmBOUnmap() [all …]
|
D | wsbm_pool.h | 86 wsbmBufStorageInit(struct _WsbmBufStorage *storage, in wsbmBufStorageInit() argument 89 int ret = WSBM_MUTEX_INIT(&storage->mutex); in wsbmBufStorageInit() 93 storage->pool = pool; in wsbmBufStorageInit() 94 wsbmAtomicSet(&storage->refCount, 1); in wsbmBufStorageInit() 95 wsbmAtomicSet(&storage->onList, 0); in wsbmBufStorageInit() 96 storage->destroyContainer = NULL; in wsbmBufStorageInit() 101 wsbmBufStorageTakedown(struct _WsbmBufStorage *storage) in wsbmBufStorageTakedown() argument 103 WSBM_MUTEX_FREE(&storage->mutex); in wsbmBufStorageTakedown() 109 struct _WsbmBufStorage *storage = *pStorage; in wsbmBufStorageUnref() local 112 if (storage == NULL) in wsbmBufStorageUnref() [all …]
|
D | wsbm_slabpool.c | 73 struct _WsbmBufStorage storage; member 200 return slabPoolFromPool(sBuf->storage.pool); in slabPoolFromBuf() 206 return containerOf(buf, struct _WsbmSlabBuffer, storage); in slabBuffer() 485 ret = wsbmBufStorageInit(&sBuf->storage, &header->slabPool->pool); in wsbmAllocSlab() 509 wsbmBufStorageTakedown(&sBuf->storage); in wsbmAllocSlab() 564 wsbmBufStorageTakedown(&sBuf->storage); in wsbmSlabFreeBufferLocked() 688 buf->storage.destroyContainer = NULL; in wsbmSlabAllocBuffer() 719 return ((sBuf) ? &sBuf->storage : NULL); in pool_create() 741 ret = wsbmBufStorageInit(&sBuf->storage, pool); in pool_create() 777 return &sBuf->storage; in pool_create() [all …]
|
D | wsbm_driver.h | 45 unsigned long storage[WSBM_MUTEX_SPACE]; member 51 unsigned long storage[WSBM_COND_SPACE]; member
|
/hardware/interfaces/health/2.0/ |
D | types.hal | 31 * Identification attributes for a storage device. 35 * Set to true if internal storage 43 * Name of the storage device. 49 * Information on storage device including life time estimates, end of life 54 * Attributes of the storage device whose info is contained by the struct. 150 * Information on storage devices. Will be an empty vector if
|
D | README | 7 implement storage-related APIs, just do the following:
|
D | IHealth.hal | 142 * Get storage info.
|
/hardware/interfaces/health/2.0/utils/ |
D | README | 18 Default implementation for storage related APIs for (hwbinder) services of the 20 storage info, include this library. Otherwise, it should implement the following
|
/hardware/interfaces/weaver/1.0/ |
D | IWeaver.hal | 19 * Weaver provides secure storage of secret values that may only be read if the 22 * The storage must be secure as the device's user authentication and encryption
|
/hardware/interfaces/biometrics/fingerprint/2.1/ |
D | IBiometricsFingerprint.hal | 141 * provided. The caller must provide a path to a storage location within the 145 * @param storePath filesystem path to the template storage directory.
|
/hardware/interfaces/radio/1.0/ |
D | IRadioIndication.hal | 174 * Indicates that SMS storage on the SIM is full. Sent when the network 247 * Indicates that SMS storage on the RUIM is full. Messages
|
D | IRadio.hal | 1121 * Indicates whether there is storage available for new SMS messages. 1341 * Update the CDMA Preferred Roaming List (PRL) in the radio NV storage.
|
/hardware/interfaces/keymaster/4.0/ |
D | IKeymasterDevice.hal | 50 * All of the operations and storage of key material must occur in a secure environment. Secure 267 * storage available to it, but the StrongBox IKeymasterDevice does. 288 * have secure persistent storage. This model was chosen because StrongBox has secure 289 * persistent storage (by definition), but the TEE may not. The instance without storage is 293 * In what follows, T is the IKeymasterDevice instance without storage, S is the 294 * IKeymasterDevice instance with storage:
|
/hardware/interfaces/drm/1.0/ |
D | IDrmPlugin.hal | 222 * status in secure storage. 224 * A signed version of the sessionID is written to persistent storage on the
|
/hardware/intel/bootstub/ |
D | LICENSE | 139 a storage or distribution medium does not bring the other work under
|
/hardware/interfaces/automotive/vehicle/2.0/ |
D | types.hal | 1896 * must be returned by the implementation. Because vehicles may have limited storage for
|